# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
443698d01f0689f29a29c65ea340751bda5e620bbb5230d3dca1339412be010b
Pseudo Output
7607287078f845f1bb444e3f78e9180145710ea997a1bd4943565ec5521ed255
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e897eb4a16168b42c6303b9513368c3e1275014378067c194eb2c2652522d151
Commitment
4e5dc97a40c77c8e2e26e3713db0ee64235070392161e7416aee5eff7ed7d635
Range Proof
672 bytes (Bulletproof)
Memo
65958f4fefb5b3743cfe6c2c7b1a25a9ba8bf2dda6646cd27ee77ed7b404a333cf2a87273e8c382dcad18cdf4f84081ddb1498e8372a58c5d499038605f6d6bed9eaf36dba7bdd2bd5c4057f7ba250041ffc8fbf44ad5b17c5409a51359c5b333e1c5b4938b9a79fc3884756ae25fe9a63ad26b7a50e1532c08d74ffd868f8e8 (encrypted)
Stealth Address
2e191bb0259d5b0d34bc5f758328c9c3ac7bcdb4d8665d4d8ecc3bad7ebceb26
Commitment
d62cb35cfc0c2cb5249321e317d3343401ff58401d304af7088da3d1e1fd3b57
Range Proof
672 bytes (Bulletproof)
Memo
a7a1783e602623f3733d33aafe29a2f81b1b35e12d4088b0f19d508e5a645a5b57b531c37e2f889a5572695143f709ee6640492480292f815d7c56c7a6ede530e93423b1dc71cd4578130b9189fd28e8d2b409a10aae40ed2055d8bc6af5aca795308ac5998064f913cad4785b9b69e0e7ff4557d72a2f5f1e851b90f952cff1 (encrypted)
Stealth Address
36e34ee395e102a81118a5d04d51843cb020cd81df64ca54050917a2c575ea28
Commitment
c66f23a0971fbce23d85bb3f7535452cd7dff507f1ed0d73982dc64518ffa244
Range Proof
672 bytes (Bulletproof)
Memo
a1354e62f3c6a793c73f2c370a30bd7a8fae22bbb7740ae2c82d594ac822f99c463aab394ad162aeecd97c61544ec8a92c9ea5217aa873aed26eb375713cc5d946aa0135a0d465b71137db77adb014c8f28b94e4951fe3f9cf7a3c08d812fb09ccf31a622822504ff60e2cc0038ef5880de8631e87615bbdfc0d8e35f122afa6 (encrypted)